TorBT - Torrents and Magnet Links Search Engine
    
    Udemy - Da 0 ad Ethical Hacker - Parte 2 [Ita]
- Date: 2025-11-03
 - Size: 5.2 GB
 - Files: 165
 
File Name
                Size
            09 HTB Machine/001 Late_it.srt
                0 B
            04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).mp4
                246 MB
            01 Introduzione/001 Introduzione.srt
                695 B
            01 Introduzione/001 Introduzione_it.srt
                688 B
            02 Anonimato/001 Anonimato con Proxychain - Teoria.mp4
                54 MB
            02 Anonimato/001 Anonimato con Proxychain - Teoria.srt
                5.8 kB
            02 Anonimato/001 Anonimato con Proxychain - Teoria_it.srt
                6.2 kB
            02 Anonimato/002 Proxychain.mp4
                212 MB
            02 Anonimato/002 Proxychain.srt
                15 kB
            02 Anonimato/002 Proxychain_it.srt
                16 kB
            03 FootPrinting - OSINT/001 Footprinting - Teoria.mp4
                88 MB
            03 FootPrinting - OSINT/001 Footprinting - Teoria.srt
                7.1 kB
            03 FootPrinting - OSINT/001 Footprinting - Teoria_it.srt
                7.5 kB
            03 FootPrinting - OSINT/002 Google Hacking.mp4
                99 MB
            03 FootPrinting - OSINT/002 Google Hacking.srt
                11 kB
            03 FootPrinting - OSINT/002 Google Hacking_it.srt
                12 kB
            03 FootPrinting - OSINT/003 Intelligence X.mp4
                80 MB
            03 FootPrinting - OSINT/003 Intelligence X.srt
                9.6 kB
            03 FootPrinting - OSINT/003 Intelligence X_it.srt
                10 kB
            03 FootPrinting - OSINT/004 SpiderFoot.mp4
                117 MB
            03 FootPrinting - OSINT/004 SpiderFoot.srt
                11 kB
            03 FootPrinting - OSINT/004 SpiderFoot_it.srt
                12 kB
            03 FootPrinting - OSINT/005 MassScan.mp4
                160 MB
            03 FootPrinting - OSINT/005 MassScan.srt
                12 kB
            03 FootPrinting - OSINT/005 MassScan_it.srt
                13 kB
            04 Vulnerability Assessment/001 VA - Teoria.mp4
                83 MB
            04 Vulnerability Assessment/001 VA - Teoria.srt
                5.9 kB
            04 Vulnerability Assessment/001 VA - Teoria_it.srt
                6.3 kB
            04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.mp4
                118 MB
            04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione.srt
                13 kB
            04 Vulnerability Assessment/002 Nessus - Installazione e Configurazione_it.srt
                14 kB
            04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.mp4
                70 MB
            04 Vulnerability Assessment/003 Nessus - Lancio di una scansione.srt
                9.2 kB
            04 Vulnerability Assessment/003 Nessus - Lancio di una scansione_it.srt
                9.8 kB
            04 Vulnerability Assessment/004 Nessus - Analisi risultati.mp4
                66 MB
            04 Vulnerability Assessment/004 Nessus - Analisi risultati.srt
                9.0 kB
            04 Vulnerability Assessment/004 Nessus - Analisi risultati_it.srt
                9.5 kB
            04 Vulnerability Assessment/005 Nessus - Report.mp4
                116 MB
            04 Vulnerability Assessment/005 Nessus - Report.srt
                11 kB
            04 Vulnerability Assessment/005 Nessus - Report_it.srt
                12 kB
            04 Vulnerability Assessment/006 Nmap Vulners.mp4
                154 MB
            04 Vulnerability Assessment/006 Nmap Vulners.srt
                12 kB
            04 Vulnerability Assessment/006 Nmap Vulners_it.srt
                12 kB
            01 Introduzione/001 Introduzione.mp4
                12 MB
            04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction).srt
                15 kB
            04 Vulnerability Assessment/007 Identification and Bypassing Firewall Nmap (Introduction)_it.srt
                16 kB
            04 Vulnerability Assessment/008 JSafe Scanner.mp4
                90 MB
            04 Vulnerability Assessment/008 JSafe Scanner.srt
                12 kB
            04 Vulnerability Assessment/008 JSafe Scanner_it.srt
                13 kB
            04 Vulnerability Assessment/009 WP Scan.mp4
                98 MB
            04 Vulnerability Assessment/009 WP Scan.srt
                9.2 kB
            04 Vulnerability Assessment/009 WP Scan_it.srt
                9.7 kB
            05 WAPT - Burp Accademy/001 File Path Traversal.mp4
                52 MB
            05 WAPT - Burp Accademy/001 File Path Traversal.srt
                6.6 kB
            05 WAPT - Burp Accademy/001 File Path Traversal_it.srt
                7.0 kB
            05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.mp4
                52 MB
            05 WAPT - Burp Accademy/002 File Path Traversal - Example 1.srt
                6.2 kB
            05 WAPT - Burp Accademy/002 File Path Traversal - Example 1_it.srt
                6.6 kB
            05 WAPT - Burp Accademy/003 File Path Traversal - Example 2.mp4
                29 MB
            05 WAPT - Burp Accademy/003 File Path Traversal - Example 2_it.srt
                3.5 kB
            05 WAPT - Burp Accademy/004 File Path Traversal - Example 3.mp4
                21 MB
            05 WAPT - Burp Accademy/004 File Path Traversal - Example 3_it.srt
                2.6 kB
            05 WAPT - Burp Accademy/005 File Path Traversal - Example 4.mp4
                25 MB
            05 WAPT - Burp Accademy/005 File Path Traversal - Example 4_it.srt
                3.4 kB
            05 WAPT - Burp Accademy/006 File Path Traversal - Example 5.mp4
                25 MB
            05 WAPT - Burp Accademy/006 File Path Traversal - Example 5_it.srt
                2.5 kB
            05 WAPT - Burp Accademy/007 File Path Traversal - Example 6.mp4
                28 MB
            05 WAPT - Burp Accademy/007 File Path Traversal - Example 6_it.srt
                3.4 kB
            05 WAPT - Burp Accademy/008 Prevent Directory Traversal.mp4
                26 MB
            05 WAPT - Burp Accademy/008 Prevent Directory Traversal_it.srt
                2.9 kB
            05 WAPT - Burp Accademy/009 File Upload Vulnerabilities.mp4
                39 MB
            05 WAPT - Burp Accademy/009 File Upload Vulnerabilities_it.srt
                3.5 kB
            05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1.mp4
                48 MB
            05 WAPT - Burp Accademy/010 File Upload Vulnerabilities - Example 1_it.srt
                7.2 kB
            05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2.mp4
                37 MB
            05 WAPT - Burp Accademy/011 File Upload Vulnerabilities - Example 2_it.srt
                4.9 kB
            05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3.mp4
                45 MB
            05 WAPT - Burp Accademy/012 File Upload Vulnerabilities - Example 3_it.srt
                6.2 kB
            05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4.mp4
                41 MB
            05 WAPT - Burp Accademy/013 File Upload Vulnerabilities - Example 4_it.srt
                5.1 kB
            05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5.mp4
                50 MB
            05 WAPT - Burp Accademy/014 File Upload Vulnerabilities - Example 5_it.srt
                6.6 kB
            05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention.mp4
                27 MB
            05 WAPT - Burp Accademy/015 File Upload Vulnerabilities - Prevention_it.srt
                3.3 kB
            05 WAPT - Burp Accademy/016 Os Command Injection.mp4
                36 MB
            05 WAPT - Burp Accademy/016 Os Command Injection_it.srt
                4.2 kB
            05 WAPT - Burp Accademy/017 Os Command Injection - Example 1.mp4
                45 MB
            05 WAPT - Burp Accademy/017 Os Command Injection - Example 1_it.srt
                7.2 kB
            05 WAPT - Burp Accademy/018 Os Command Injection - Example 2.mp4
                34 MB
            05 WAPT - Burp Accademy/018 Os Command Injection - Example 2_it.srt
                5.2 kB
            05 WAPT - Burp Accademy/019 Os Command Injection - Example 3.mp4
                37 MB
            05 WAPT - Burp Accademy/019 Os Command Injection - Example 3_it.srt
                5.1 kB
            05 WAPT - Burp Accademy/020 Information Disclosure.mp4
                24 MB
            05 WAPT - Burp Accademy/020 Information Disclosure_it.srt
                2.1 kB
            05 WAPT - Burp Accademy/021 Information Disclosure - Example 1.mp4
                26 MB
            05 WAPT - Burp Accademy/021 Information Disclosure - Example 1_it.srt
                2.7 kB
            05 WAPT - Burp Accademy/022 Information Disclosure - Example 2.mp4
                35 MB
            05 WAPT - Burp Accademy/022 Information Disclosure - Example 2_it.srt
                3.2 kB
            05 WAPT - Burp Accademy/023 Information Disclosure - Example 3.mp4
                28 MB
            05 WAPT - Burp Accademy/023 Information Disclosure - Example 3_it.srt
                3.5 kB
            05 WAPT - Burp Accademy/024 Information Disclosure - Example 4.mp4
                61 MB
            05 WAPT - Burp Accademy/024 Information Disclosure - Example 4_it.srt
                9.8 kB
            05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery.mp4
                45 MB
            05 WAPT - Burp Accademy/025 SSRF - Server Side Request Forgery_it.srt
                5.6 kB
            05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1.mp4
                60 MB
            05 WAPT - Burp Accademy/026 SSRF - Server Side Request Forgery - Example 1_it.srt
                6.8 kB
            05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2.mp4
                75 MB
            05 WAPT - Burp Accademy/027 SSRF - Server Side Request Forgery - Example 2_it.srt
                8.6 kB
            05 WAPT - Burp Accademy/028 XXE - Xml External Entity.mp4
                30 MB
            05 WAPT - Burp Accademy/028 XXE - Xml External Entity_it.srt
                3.7 kB
            05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1.mp4
                34 MB
            05 WAPT - Burp Accademy/029 XXE - Xml External Entity - Example 1_it.srt
                3.1 kB
            05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2.mp4
                52 MB
            05 WAPT - Burp Accademy/030 XXE - Xml External Entity - Example 2_it.srt
                5.0 kB
            05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3.mp4
                40 MB
            05 WAPT - Burp Accademy/031 XXE - Xml External Entity - Example 3_it.srt
                3.9 kB
            05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4.mp4
                32 MB
            05 WAPT - Burp Accademy/032 XXE - Xml External Entity - Example 4_it.srt
                4.5 kB
            05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection.mp4
                56 MB
            05 WAPT - Burp Accademy/033 SSTI - Server Side Template Injection_it.srt
                5.7 kB
            05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1.mp4
                70 MB
            05 WAPT - Burp Accademy/034 SSTI - Server Side Template Injection - Example 1_it.srt
                8.1 kB
            05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2.mp4
                74 MB
            05 WAPT - Burp Accademy/035 SSTI - Server Side Template Injection - Example 2_it.srt
                10 kB
            06 Cracking Password/001 Password Cracking - Teoria.mp4
                129 MB
            06 Cracking Password/001 Password Cracking - Teoria_it.srt
                13 kB
            06 Cracking Password/002 John The Ripper.mp4
                58 MB
            06 Cracking Password/002 John The Ripper_it.srt
                8.2 kB
            06 Cracking Password/003 Hydra.mp4
                69 MB
            06 Cracking Password/003 Hydra_it.srt
                8.0 kB
            06 Cracking Password/004 Hashcat.mp4
                129 MB
            06 Cracking Password/004 Hashcat_it.srt
                16 kB
            06 Cracking Password/005 Raimbow Tables.mp4
                73 MB
            06 Cracking Password/005 Raimbow Tables_it.srt
                7.6 kB
            07 HoneyPot/001 HoneyPot - Teoria.mp4
                66 MB
            07 HoneyPot/001 HoneyPot - Teoria_it.srt
                5.8 kB
            07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot).mp4
                48 MB
            07 HoneyPot/002 Honeypot SSHICMP (Esempio di Jhoneypot)_it.srt
                7.0 kB
            08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware).mp4
                59 MB
            08 HARDWARETELCO HACKING/001 Introduzione del dispositivo da testare (Hardware)_it.srt
                6.1 kB
            08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro.mp4
                62 MB
            08 HARDWARETELCO HACKING/002 Utilizzo del Multimetro_it.srt
                4.9 kB
            08 HARDWARETELCO HACKING/003 Logic Analyzer.mp4
                176 MB
            08 HARDWARETELCO HACKING/003 Logic Analyzer_it.srt
                12 kB
            08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART.mp4
                91 MB
            08 HARDWARETELCO HACKING/004 BootLoader attraverso la UART_it.srt
                7.3 kB
            08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1.mp4
                91 MB
            08 HARDWARETELCO HACKING/005 Dumping SPI - Parte 1_it.srt
                6.6 kB
            08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2.mp4
                45 MB
            08 HARDWARETELCO HACKING/006 Dumping SPI (Con presa dell'utente Root) - Parte 2_it.srt
                5.1 kB
            08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack.mp4
                106 MB
            08 HARDWARETELCO HACKING/007 Flipper Zero - Intro and 125Khz attack_it.srt
                7.9 kB
            08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz.mp4
                60 MB
            08 HARDWARETELCO HACKING/008 Flipper Zero - Attack on NFC and SubGhz_it.srt
                3.4 kB
            08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack.mp4
                90 MB
            08 HARDWARETELCO HACKING/009 Flipper Zero - Bad USB and Infrared Attack_it.srt
                4.8 kB
            09 HTB Machine/001 Late.mp4
                203 MB
            Read Me.txt
                17 B
            09 HTB Machine/002 Paper - WriteUp.html
                220 B
            10 Caso Reale/001 Vulnerabilità Log4J - Parte 1.mp4
                155 MB
            10 Caso Reale/001 Vulnerabilità Log4J - Parte 1_it.srt
                13 kB
            10 Caso Reale/002 Vulnerabilità Log4J - Parte 2.mp4
                174 MB
            10 Caso Reale/002 Vulnerabilità Log4J - Parte 2_it.srt
                16 kB
            10 Caso Reale/003 Vulnerabilità Log4J - Parte 3.mp4
                133 MB
            10 Caso Reale/003 Vulnerabilità Log4J - Parte 3_it.srt
                11 kB